1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
3 years ago
8

To prevent rust from forming, a light coating of_____should be applied to all machined surfaces

Computers and Technology
1 answer:
Fantom [35]3 years ago
4 0
What is that I never heard of that before
You might be interested in
What is your opinion on gaming? do you think it has more positive or negative impacts
joja [24]

Answer:

positive bc you can learn from them wwhat to do what not to do mistakes that you wont make in. real life

4 0
2 years ago
Read 2 more answers
Basic python coding, What is the output of this program? Assume the user enters 2, 5, and 10.
r-ruslan [8.4K]

Answer:

17.0

Explanation:

after first loop numA = 0.0 + 2 = 2.0

after second loop numA = 2.0 + 5 = 7.0

after third loop numA = 7 + 10 = 17.0

8 0
3 years ago
After reviewing device security you learn that a malicious user in an airport
NARA [144]

Answer:

Sniffing.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.

Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.

A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.

Basically, an unauthorized packet sniffer is used to steal user informations.

This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.

In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.

4 0
3 years ago
Need the answer ASAP!!! I’ll mark brainliest if correct
san4es73 [151]

Answer:

update standerds

Explanation:

7 0
3 years ago
It is important to analyze the sources and uses of cash because:___.
sergey [27]

It is important to analyze the sources and uses of cash because creditors use this information to assist them in deciding whether to loan funds to them. Investors use this information to decide if they will purchase their stock.

Managing your revenue is an important step to starting or investing in something.

Creditors always check and properly analyze the sources of cash before providing a loan to a lender. They do not invest in companies or people who are least likely to source and make cash in the coming time. Hence, your sources and uses shall be properly analyzed when presenting to creditors.

Investors, whenever investing in something will look at the benefits of the source they want to invest into. If a source is not likely to produce beneficiary revenue in the upcoming time, then investors will never invest in such a kind of source.

To learn more about investors, click here:

brainly.com/question/25311149

#SPJ4

5 0
2 years ago
Other questions:
  • Ted is a fashion designer. Where is he most likely to work
    9·1 answer
  • What happens when your computer is in Hibernate mode?
    12·1 answer
  • If you want to place the insertion point in a cell to edit a specific part of its contents, you can
    5·1 answer
  • The word count of the active document is typically displayed on the ________.
    15·1 answer
  • Need help writing a program that reads a string if the option "E" (enter a string) is chosen, and checks if parentheses (), brac
    14·1 answer
  • In a ring-based system, procedure p is executing and needs to invoke procedure q. Procedure q's access bracket is (5,6,9). In wh
    15·2 answers
  • Analyze the following code. // Program 1: public class Test { public static void main(String[] args) { Object a1 = new A(); Obje
    5·1 answer
  • Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
    9·1 answer
  • An ALGORITHM IS?<br> PLEASE HELP
    14·1 answer
  • if anyone is on a Chromebook, do you ever mean to press backspace, then you accidentally press the power button and think "OH CR
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!